establishingsecurity / trustzone-rootkitLinks
TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.
☆14Updated 3 years ago
Alternatives and similar repositories for trustzone-rootkit
Users that are interested in trustzone-rootkit are comparing it to the libraries listed below
Sorting:
- IDA (sort of) headless☆24Updated last year
- Companion to the "Introduction to VirtualBox security research" Blog Post☆30Updated 3 years ago
- ☆14Updated 2 years ago
- binary ninja related code☆35Updated 3 months ago
- Ghidra analyzer for UEFI firmware.☆19Updated 2 years ago
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆41Updated 3 years ago
- IDA Database Importer plugin for Binary Ninja☆37Updated 9 months ago
- CTF writeups☆9Updated 5 years ago
- ☆18Updated 3 years ago
- ☆35Updated 4 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆18Updated 4 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- Breaking Secure Boot with SMM☆41Updated 3 years ago
- An AFL scaling benchmarking tool☆18Updated 5 years ago
- Export a binary from ghidra to emulate with unicorn☆27Updated 5 years ago
- ☆33Updated 2 years ago
- Binary Ninja plugin that decompiles the whole binary and saves them in a directory.☆22Updated 2 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆33Updated 4 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆33Updated 4 years ago
- JS modules for Frida based tools to add code coverage to your instrumentation scripts.☆26Updated 6 years ago
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Updated 5 years ago
- Sample Binary Ninja Plugin☆22Updated 2 years ago
- ☆10Updated 3 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- Code Coverage client for DynamoRIO☆12Updated 6 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆29Updated 2 years ago
- PoC for House of Husk Exploit☆13Updated 5 years ago
- Python interface for Binexport, the Bindiff export format☆17Updated 2 weeks ago
- Ditto.☆18Updated 4 years ago